@pulumi/vault 5.4.0 → 5.4.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (137) hide show
  1. package/ad/secretBackend.d.ts +16 -0
  2. package/ad/secretBackend.js +16 -0
  3. package/ad/secretBackend.js.map +1 -1
  4. package/ad/secretLibrary.d.ts +62 -18
  5. package/ad/secretLibrary.js +35 -0
  6. package/ad/secretLibrary.js.map +1 -1
  7. package/ad/secretRole.d.ts +22 -0
  8. package/ad/secretRole.js +22 -0
  9. package/ad/secretRole.js.map +1 -1
  10. package/approle/authBackendRoleSecretID.d.ts +12 -10
  11. package/approle/authBackendRoleSecretID.js +3 -4
  12. package/approle/authBackendRoleSecretID.js.map +1 -1
  13. package/aws/authBackendClient.d.ts +14 -0
  14. package/aws/authBackendClient.js +14 -0
  15. package/aws/authBackendClient.js.map +1 -1
  16. package/aws/authBackendStsRole.d.ts +14 -0
  17. package/aws/authBackendStsRole.js +14 -0
  18. package/aws/authBackendStsRole.js.map +1 -1
  19. package/aws/getAccessCredentials.d.ts +31 -0
  20. package/aws/getAccessCredentials.js +31 -0
  21. package/aws/getAccessCredentials.js.map +1 -1
  22. package/aws/secretBackend.d.ts +12 -0
  23. package/aws/secretBackend.js +12 -0
  24. package/aws/secretBackend.js.map +1 -1
  25. package/aws/secretBackendRole.d.ts +27 -0
  26. package/aws/secretBackendRole.js +27 -0
  27. package/aws/secretBackendRole.js.map +1 -1
  28. package/azure/authBackendConfig.d.ts +16 -0
  29. package/azure/authBackendConfig.js +16 -0
  30. package/azure/authBackendConfig.js.map +1 -1
  31. package/azure/backend.d.ts +33 -0
  32. package/azure/backend.js +33 -0
  33. package/azure/backend.js.map +1 -1
  34. package/azure/backendRole.d.ts +32 -0
  35. package/azure/backendRole.js +32 -0
  36. package/azure/backendRole.js.map +1 -1
  37. package/azure/getAccessCredentials.d.ts +40 -0
  38. package/azure/getAccessCredentials.js +22 -0
  39. package/azure/getAccessCredentials.js.map +1 -1
  40. package/consul/secretBackend.d.ts +14 -0
  41. package/consul/secretBackend.js +14 -0
  42. package/consul/secretBackend.js.map +1 -1
  43. package/database/secretBackendConnection.d.ts +22 -0
  44. package/database/secretBackendConnection.js +22 -0
  45. package/database/secretBackendConnection.js.map +1 -1
  46. package/database/secretBackendRole.d.ts +27 -0
  47. package/database/secretBackendRole.js +27 -0
  48. package/database/secretBackendRole.js.map +1 -1
  49. package/gcp/secretBackend.d.ts +11 -0
  50. package/gcp/secretBackend.js +11 -0
  51. package/gcp/secretBackend.js.map +1 -1
  52. package/generic/endpoint.d.ts +52 -0
  53. package/generic/endpoint.js +52 -0
  54. package/generic/endpoint.js.map +1 -1
  55. package/generic/getSecret.d.ts +15 -0
  56. package/generic/getSecret.js +15 -0
  57. package/generic/getSecret.js.map +1 -1
  58. package/getNomadAccessToken.d.ts +27 -0
  59. package/getNomadAccessToken.js +27 -0
  60. package/getNomadAccessToken.js.map +1 -1
  61. package/identity/entity.d.ts +14 -0
  62. package/identity/entity.js +14 -0
  63. package/identity/entity.js.map +1 -1
  64. package/identity/entityAlias.d.ts +12 -0
  65. package/identity/entityAlias.js +12 -0
  66. package/identity/entityAlias.js.map +1 -1
  67. package/identity/getEntity.d.ts +15 -0
  68. package/identity/getEntity.js +15 -0
  69. package/identity/getEntity.js.map +1 -1
  70. package/identity/getGroup.d.ts +15 -0
  71. package/identity/getGroup.js +15 -0
  72. package/identity/getGroup.js.map +1 -1
  73. package/identity/getOidcClientCreds.d.ts +21 -0
  74. package/identity/getOidcClientCreds.js +21 -0
  75. package/identity/getOidcClientCreds.js.map +1 -1
  76. package/identity/getOidcOpenidConfig.d.ts +28 -0
  77. package/identity/getOidcOpenidConfig.js +28 -0
  78. package/identity/getOidcOpenidConfig.js.map +1 -1
  79. package/identity/getOidcPublicKeys.d.ts +28 -0
  80. package/identity/getOidcPublicKeys.js +28 -0
  81. package/identity/getOidcPublicKeys.js.map +1 -1
  82. package/identity/oidcKey.d.ts +14 -0
  83. package/identity/oidcKey.js +14 -0
  84. package/identity/oidcKey.js.map +1 -1
  85. package/identity/oidcKeyAllowedClientID.d.ts +15 -0
  86. package/identity/oidcKeyAllowedClientID.js +15 -0
  87. package/identity/oidcKeyAllowedClientID.js.map +1 -1
  88. package/identity/oidcRole.d.ts +36 -0
  89. package/identity/oidcRole.js +36 -0
  90. package/identity/oidcRole.js.map +1 -1
  91. package/nomadSecretBackend.d.ts +18 -0
  92. package/nomadSecretBackend.js +18 -0
  93. package/nomadSecretBackend.js.map +1 -1
  94. package/nomadSecretRole.d.ts +22 -0
  95. package/nomadSecretRole.js +22 -0
  96. package/nomadSecretRole.js.map +1 -1
  97. package/package.json +2 -2
  98. package/package.json.dev +2 -2
  99. package/pkisecret/secretBackendCert.d.ts +15 -0
  100. package/pkisecret/secretBackendCert.js +15 -0
  101. package/pkisecret/secretBackendCert.js.map +1 -1
  102. package/pkisecret/secretBackendConfigCa.d.ts +63 -0
  103. package/pkisecret/secretBackendConfigCa.js +63 -0
  104. package/pkisecret/secretBackendConfigCa.js.map +1 -1
  105. package/pkisecret/secretBackendIntermediateCertRequest.d.ts +16 -0
  106. package/pkisecret/secretBackendIntermediateCertRequest.js +16 -0
  107. package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
  108. package/pkisecret/secretBackendIntermediateSetSigned.d.ts +13 -0
  109. package/pkisecret/secretBackendIntermediateSetSigned.js +13 -0
  110. package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
  111. package/pkisecret/secretBackendRootCert.d.ts +24 -0
  112. package/pkisecret/secretBackendRootCert.js +24 -0
  113. package/pkisecret/secretBackendRootCert.js.map +1 -1
  114. package/pkisecret/secretBackendSign.d.ts +43 -0
  115. package/pkisecret/secretBackendSign.js +43 -0
  116. package/pkisecret/secretBackendSign.js.map +1 -1
  117. package/rabbitmq/secretBackend.d.ts +37 -0
  118. package/rabbitmq/secretBackend.js +17 -0
  119. package/rabbitmq/secretBackend.js.map +1 -1
  120. package/rabbitmq/secretBackendRole.d.ts +31 -0
  121. package/rabbitmq/secretBackendRole.js +31 -0
  122. package/rabbitmq/secretBackendRole.js.map +1 -1
  123. package/raftSnapshotAgentConfig.d.ts +16 -0
  124. package/raftSnapshotAgentConfig.js +16 -0
  125. package/raftSnapshotAgentConfig.js.map +1 -1
  126. package/terraformcloud/secretBackend.d.ts +13 -0
  127. package/terraformcloud/secretBackend.js +13 -0
  128. package/terraformcloud/secretBackend.js.map +1 -1
  129. package/terraformcloud/secretCreds.d.ts +23 -0
  130. package/terraformcloud/secretCreds.js +23 -0
  131. package/terraformcloud/secretCreds.js.map +1 -1
  132. package/terraformcloud/secretRole.d.ts +18 -0
  133. package/terraformcloud/secretRole.js +18 -0
  134. package/terraformcloud/secretRole.js.map +1 -1
  135. package/token.d.ts +19 -0
  136. package/token.js +19 -0
  137. package/token.js.map +1 -1
@@ -1,4 +1,25 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
+ /**
3
+ * ## Example Usage
4
+ *
5
+ * ```typescript
6
+ * import * as pulumi from "@pulumi/pulumi";
7
+ * import * as vault from "@pulumi/vault";
8
+ *
9
+ * const app = new vault.identity.OidcClient("app", {
10
+ * redirectUris: [
11
+ * "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
12
+ * "http://127.0.0.1:8251/callback",
13
+ * "http://127.0.0.1:8080/callback",
14
+ * ],
15
+ * idTokenTtl: 2400,
16
+ * accessTokenTtl: 7200,
17
+ * });
18
+ * const creds = vault.identity.getOidcClientCredsOutput({
19
+ * name: app.name,
20
+ * });
21
+ * ```
22
+ */
2
23
  export declare function getOidcClientCreds(args: GetOidcClientCredsArgs, opts?: pulumi.InvokeOptions): Promise<GetOidcClientCredsResult>;
3
24
  /**
4
25
  * A collection of arguments for invoking getOidcClientCreds.
@@ -5,6 +5,27 @@ Object.defineProperty(exports, "__esModule", { value: true });
5
5
  exports.getOidcClientCredsOutput = exports.getOidcClientCreds = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("../utilities");
8
+ /**
9
+ * ## Example Usage
10
+ *
11
+ * ```typescript
12
+ * import * as pulumi from "@pulumi/pulumi";
13
+ * import * as vault from "@pulumi/vault";
14
+ *
15
+ * const app = new vault.identity.OidcClient("app", {
16
+ * redirectUris: [
17
+ * "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
18
+ * "http://127.0.0.1:8251/callback",
19
+ * "http://127.0.0.1:8080/callback",
20
+ * ],
21
+ * idTokenTtl: 2400,
22
+ * accessTokenTtl: 7200,
23
+ * });
24
+ * const creds = vault.identity.getOidcClientCredsOutput({
25
+ * name: app.name,
26
+ * });
27
+ * ```
28
+ */
8
29
  function getOidcClientCreds(args, opts) {
9
30
  if (!opts) {
10
31
  opts = {};
@@ -1 +1 @@
1
- {"version":3,"file":"getOidcClientCreds.js","sourceRoot":"","sources":["../../identity/getOidcClientCreds.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,kBAAkB,CAAC,IAA4B,EAAE,IAA2B;IACxF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,sDAAsD,EAAE;QACjF,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AATD,gDASC;AA+BD,SAAgB,wBAAwB,CAAC,IAAkC,EAAE,IAA2B;IACpG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,kBAAkB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACtE,CAAC;AAFD,4DAEC"}
1
+ {"version":3,"file":"getOidcClientCreds.js","sourceRoot":"","sources":["../../identity/getOidcClientCreds.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,SAAgB,kBAAkB,CAAC,IAA4B,EAAE,IAA2B;IACxF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,sDAAsD,EAAE;QACjF,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AATD,gDASC;AA+BD,SAAgB,wBAAwB,CAAC,IAAkC,EAAE,IAA2B;IACpG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,kBAAkB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACtE,CAAC;AAFD,4DAEC"}
@@ -1,4 +1,32 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
+ /**
3
+ * ## Example Usage
4
+ *
5
+ * ```typescript
6
+ * import * as pulumi from "@pulumi/pulumi";
7
+ * import * as vault from "@pulumi/vault";
8
+ *
9
+ * const key = new vault.identity.OidcKey("key", {
10
+ * allowedClientIds: ["*"],
11
+ * rotationPeriod: 3600,
12
+ * verificationTtl: 3600,
13
+ * });
14
+ * const app = new vault.identity.OidcClient("app", {
15
+ * key: key.name,
16
+ * redirectUris: [
17
+ * "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
18
+ * "http://127.0.0.1:8251/callback",
19
+ * "http://127.0.0.1:8080/callback",
20
+ * ],
21
+ * idTokenTtl: 2400,
22
+ * accessTokenTtl: 7200,
23
+ * });
24
+ * const provider = new vault.identity.OidcProvider("provider", {allowedClientIds: [vault_identity_oidc_client.test.client_id]});
25
+ * const config = vault.identity.getOidcOpenidConfigOutput({
26
+ * name: provider.name,
27
+ * });
28
+ * ```
29
+ */
2
30
  export declare function getOidcOpenidConfig(args: GetOidcOpenidConfigArgs, opts?: pulumi.InvokeOptions): Promise<GetOidcOpenidConfigResult>;
3
31
  /**
4
32
  * A collection of arguments for invoking getOidcOpenidConfig.
@@ -5,6 +5,34 @@ Object.defineProperty(exports, "__esModule", { value: true });
5
5
  exports.getOidcOpenidConfigOutput = exports.getOidcOpenidConfig = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("../utilities");
8
+ /**
9
+ * ## Example Usage
10
+ *
11
+ * ```typescript
12
+ * import * as pulumi from "@pulumi/pulumi";
13
+ * import * as vault from "@pulumi/vault";
14
+ *
15
+ * const key = new vault.identity.OidcKey("key", {
16
+ * allowedClientIds: ["*"],
17
+ * rotationPeriod: 3600,
18
+ * verificationTtl: 3600,
19
+ * });
20
+ * const app = new vault.identity.OidcClient("app", {
21
+ * key: key.name,
22
+ * redirectUris: [
23
+ * "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
24
+ * "http://127.0.0.1:8251/callback",
25
+ * "http://127.0.0.1:8080/callback",
26
+ * ],
27
+ * idTokenTtl: 2400,
28
+ * accessTokenTtl: 7200,
29
+ * });
30
+ * const provider = new vault.identity.OidcProvider("provider", {allowedClientIds: [vault_identity_oidc_client.test.client_id]});
31
+ * const config = vault.identity.getOidcOpenidConfigOutput({
32
+ * name: provider.name,
33
+ * });
34
+ * ```
35
+ */
8
36
  function getOidcOpenidConfig(args, opts) {
9
37
  if (!opts) {
10
38
  opts = {};
@@ -1 +1 @@
1
- {"version":3,"file":"getOidcOpenidConfig.js","sourceRoot":"","sources":["../../identity/getOidcOpenidConfig.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,mBAAmB,CAAC,IAA6B,EAAE,IAA2B;IAC1F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wDAAwD,EAAE;QACnF,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AATD,kDASC;AAyED,SAAgB,yBAAyB,CAAC,IAAmC,EAAE,IAA2B;IACtG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,mBAAmB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACvE,CAAC;AAFD,8DAEC"}
1
+ {"version":3,"file":"getOidcOpenidConfig.js","sourceRoot":"","sources":["../../identity/getOidcOpenidConfig.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2BG;AACH,SAAgB,mBAAmB,CAAC,IAA6B,EAAE,IAA2B;IAC1F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wDAAwD,EAAE;QACnF,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AATD,kDASC;AAyED,SAAgB,yBAAyB,CAAC,IAAmC,EAAE,IAA2B;IACtG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,mBAAmB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACvE,CAAC;AAFD,8DAEC"}
@@ -1,4 +1,32 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
+ /**
3
+ * ## Example Usage
4
+ *
5
+ * ```typescript
6
+ * import * as pulumi from "@pulumi/pulumi";
7
+ * import * as vault from "@pulumi/vault";
8
+ *
9
+ * const key = new vault.identity.OidcKey("key", {
10
+ * allowedClientIds: ["*"],
11
+ * rotationPeriod: 3600,
12
+ * verificationTtl: 3600,
13
+ * });
14
+ * const app = new vault.identity.OidcClient("app", {
15
+ * key: key.name,
16
+ * redirectUris: [
17
+ * "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
18
+ * "http://127.0.0.1:8251/callback",
19
+ * "http://127.0.0.1:8080/callback",
20
+ * ],
21
+ * idTokenTtl: 2400,
22
+ * accessTokenTtl: 7200,
23
+ * });
24
+ * const provider = new vault.identity.OidcProvider("provider", {allowedClientIds: [vault_identity_oidc_client.test.client_id]});
25
+ * const publicKeys = vault.identity.getOidcPublicKeysOutput({
26
+ * name: provider.name,
27
+ * });
28
+ * ```
29
+ */
2
30
  export declare function getOidcPublicKeys(args: GetOidcPublicKeysArgs, opts?: pulumi.InvokeOptions): Promise<GetOidcPublicKeysResult>;
3
31
  /**
4
32
  * A collection of arguments for invoking getOidcPublicKeys.
@@ -5,6 +5,34 @@ Object.defineProperty(exports, "__esModule", { value: true });
5
5
  exports.getOidcPublicKeysOutput = exports.getOidcPublicKeys = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("../utilities");
8
+ /**
9
+ * ## Example Usage
10
+ *
11
+ * ```typescript
12
+ * import * as pulumi from "@pulumi/pulumi";
13
+ * import * as vault from "@pulumi/vault";
14
+ *
15
+ * const key = new vault.identity.OidcKey("key", {
16
+ * allowedClientIds: ["*"],
17
+ * rotationPeriod: 3600,
18
+ * verificationTtl: 3600,
19
+ * });
20
+ * const app = new vault.identity.OidcClient("app", {
21
+ * key: key.name,
22
+ * redirectUris: [
23
+ * "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
24
+ * "http://127.0.0.1:8251/callback",
25
+ * "http://127.0.0.1:8080/callback",
26
+ * ],
27
+ * idTokenTtl: 2400,
28
+ * accessTokenTtl: 7200,
29
+ * });
30
+ * const provider = new vault.identity.OidcProvider("provider", {allowedClientIds: [vault_identity_oidc_client.test.client_id]});
31
+ * const publicKeys = vault.identity.getOidcPublicKeysOutput({
32
+ * name: provider.name,
33
+ * });
34
+ * ```
35
+ */
8
36
  function getOidcPublicKeys(args, opts) {
9
37
  if (!opts) {
10
38
  opts = {};
@@ -1 +1 @@
1
- {"version":3,"file":"getOidcPublicKeys.js","sourceRoot":"","sources":["../../identity/getOidcPublicKeys.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,iBAAiB,CAAC,IAA2B,EAAE,IAA2B;IACtF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,oDAAoD,EAAE;QAC/E,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AATD,8CASC;AA4BD,SAAgB,uBAAuB,CAAC,IAAiC,EAAE,IAA2B;IAClG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,iBAAiB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACrE,CAAC;AAFD,0DAEC"}
1
+ {"version":3,"file":"getOidcPublicKeys.js","sourceRoot":"","sources":["../../identity/getOidcPublicKeys.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2BG;AACH,SAAgB,iBAAiB,CAAC,IAA2B,EAAE,IAA2B;IACtF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,oDAAoD,EAAE;QAC/E,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AATD,8CASC;AA4BD,SAAgB,uBAAuB,CAAC,IAAiC,EAAE,IAA2B;IAClG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,iBAAiB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACrE,CAAC;AAFD,0DAEC"}
@@ -1,5 +1,19 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
+ * ## Example Usage
4
+ *
5
+ * ```typescript
6
+ * import * as pulumi from "@pulumi/pulumi";
7
+ * import * as vault from "@pulumi/vault";
8
+ *
9
+ * const key = new vault.identity.OidcKey("key", {algorithm: "RS256"});
10
+ * const roleOidcRole = new vault.identity.OidcRole("roleOidcRole", {key: key.name});
11
+ * const roleOidcKeyAllowedClientID = new vault.identity.OidcKeyAllowedClientID("roleOidcKeyAllowedClientID", {
12
+ * keyName: key.name,
13
+ * allowedClientId: roleOidcRole.clientId,
14
+ * });
15
+ * ```
16
+ *
3
17
  * ## Import
4
18
  *
5
19
  * The key can be imported with the key name, for example
@@ -6,6 +6,20 @@ exports.OidcKey = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("../utilities");
8
8
  /**
9
+ * ## Example Usage
10
+ *
11
+ * ```typescript
12
+ * import * as pulumi from "@pulumi/pulumi";
13
+ * import * as vault from "@pulumi/vault";
14
+ *
15
+ * const key = new vault.identity.OidcKey("key", {algorithm: "RS256"});
16
+ * const roleOidcRole = new vault.identity.OidcRole("roleOidcRole", {key: key.name});
17
+ * const roleOidcKeyAllowedClientID = new vault.identity.OidcKeyAllowedClientID("roleOidcKeyAllowedClientID", {
18
+ * keyName: key.name,
19
+ * allowedClientId: roleOidcRole.clientId,
20
+ * });
21
+ * ```
22
+ *
9
23
  * ## Import
10
24
  *
11
25
  * The key can be imported with the key name, for example
@@ -1 +1 @@
1
- {"version":3,"file":"oidcKey.js","sourceRoot":"","sources":["../../identity/oidcKey.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,OAAQ,SAAQ,MAAM,CAAC,cAAc;IA4D9C,YAAY,IAAY,EAAE,WAAwC,EAAE,IAAmC;QACnG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuC,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;aAAM;YACH,MAAM,IAAI,GAAG,WAAsC,CAAC;YACpD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,OAAO,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5D,CAAC;IA/ED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoB,EAAE,IAAmC;QAClH,OAAO,IAAI,OAAO,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,OAAO,CAAC,YAAY,CAAC;IACxD,CAAC;;AA1BL,0BAiFC;AAnEG,gBAAgB;AACO,oBAAY,GAAG,gCAAgC,CAAC"}
1
+ {"version":3,"file":"oidcKey.js","sourceRoot":"","sources":["../../identity/oidcKey.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,MAAa,OAAQ,SAAQ,MAAM,CAAC,cAAc;IA4D9C,YAAY,IAAY,EAAE,WAAwC,EAAE,IAAmC;QACnG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuC,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;aAAM;YACH,MAAM,IAAI,GAAG,WAAsC,CAAC;YACpD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,OAAO,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5D,CAAC;IA/ED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoB,EAAE,IAAmC;QAClH,OAAO,IAAI,OAAO,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,OAAO,CAAC,YAAY,CAAC;IACxD,CAAC;;AA1BL,0BAiFC;AAnEG,gBAAgB;AACO,oBAAY,GAAG,gCAAgC,CAAC"}
@@ -1,4 +1,19 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
+ /**
3
+ * ## Example Usage
4
+ *
5
+ * ```typescript
6
+ * import * as pulumi from "@pulumi/pulumi";
7
+ * import * as vault from "@pulumi/vault";
8
+ *
9
+ * const key = new vault.identity.OidcKey("key", {algorithm: "RS256"});
10
+ * const roleOidcRole = new vault.identity.OidcRole("roleOidcRole", {key: key.name});
11
+ * const roleOidcKeyAllowedClientID = new vault.identity.OidcKeyAllowedClientID("roleOidcKeyAllowedClientID", {
12
+ * keyName: key.name,
13
+ * allowedClientId: roleOidcRole.clientId,
14
+ * });
15
+ * ```
16
+ */
2
17
  export declare class OidcKeyAllowedClientID extends pulumi.CustomResource {
3
18
  /**
4
19
  * Get an existing OidcKeyAllowedClientID resource's state with the given name, ID, and optional extra
@@ -5,6 +5,21 @@ Object.defineProperty(exports, "__esModule", { value: true });
5
5
  exports.OidcKeyAllowedClientID = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("../utilities");
8
+ /**
9
+ * ## Example Usage
10
+ *
11
+ * ```typescript
12
+ * import * as pulumi from "@pulumi/pulumi";
13
+ * import * as vault from "@pulumi/vault";
14
+ *
15
+ * const key = new vault.identity.OidcKey("key", {algorithm: "RS256"});
16
+ * const roleOidcRole = new vault.identity.OidcRole("roleOidcRole", {key: key.name});
17
+ * const roleOidcKeyAllowedClientID = new vault.identity.OidcKeyAllowedClientID("roleOidcKeyAllowedClientID", {
18
+ * keyName: key.name,
19
+ * allowedClientId: roleOidcRole.clientId,
20
+ * });
21
+ * ```
22
+ */
8
23
  class OidcKeyAllowedClientID extends pulumi.CustomResource {
9
24
  constructor(name, argsOrState, opts) {
10
25
  let resourceInputs = {};
@@ -1 +1 @@
1
- {"version":3,"file":"oidcKeyAllowedClientID.js","sourceRoot":"","sources":["../../identity/oidcKeyAllowedClientID.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IA6C7D,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,eAAe,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC5D,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;aAClE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;IAhED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;;AA1BL,wDAkEC;AApDG,gBAAgB;AACO,mCAAY,GAAG,8DAA8D,CAAC"}
1
+ {"version":3,"file":"oidcKeyAllowedClientID.js","sourceRoot":"","sources":["../../identity/oidcKeyAllowedClientID.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;GAcG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IA6C7D,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,eAAe,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC5D,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;aAClE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;IAhED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;;AA1BL,wDAkEC;AApDG,gBAAgB;AACO,mCAAY,GAAG,8DAA8D,CAAC"}
@@ -1,5 +1,41 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
+ * ## Example Usage
4
+ *
5
+ * You need to create a role with a named key.
6
+ * At creation time, the key can be created independently of the role. However, the key must
7
+ * exist before the role can be used to issue tokens. You must also configure the key with the
8
+ * role's Client ID to allow the role to use the key.
9
+ *
10
+ * ```typescript
11
+ * import * as pulumi from "@pulumi/pulumi";
12
+ * import * as vault from "@pulumi/vault";
13
+ *
14
+ * const config = new pulumi.Config();
15
+ * const key = config.get("key") || "key";
16
+ * const role = new vault.identity.OidcRole("role", {key: key});
17
+ * const keyOidcKey = new vault.identity.OidcKey("keyOidcKey", {
18
+ * algorithm: "RS256",
19
+ * allowedClientIds: [role.clientId],
20
+ * });
21
+ * ```
22
+ *
23
+ * If you want to create the key first before creating the role, you can use a separate
24
+ * resource to configure the allowed Client ID on
25
+ * the key.
26
+ *
27
+ * ```typescript
28
+ * import * as pulumi from "@pulumi/pulumi";
29
+ * import * as vault from "@pulumi/vault";
30
+ *
31
+ * const key = new vault.identity.OidcKey("key", {algorithm: "RS256"});
32
+ * const roleOidcRole = new vault.identity.OidcRole("roleOidcRole", {key: key.name});
33
+ * const roleOidcKeyAllowedClientID = new vault.identity.OidcKeyAllowedClientID("roleOidcKeyAllowedClientID", {
34
+ * keyName: key.name,
35
+ * allowedClientId: roleOidcRole.clientId,
36
+ * });
37
+ * ```
38
+ *
3
39
  * ## Import
4
40
  *
5
41
  * The key can be imported with the role name, for example
@@ -6,6 +6,42 @@ exports.OidcRole = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("../utilities");
8
8
  /**
9
+ * ## Example Usage
10
+ *
11
+ * You need to create a role with a named key.
12
+ * At creation time, the key can be created independently of the role. However, the key must
13
+ * exist before the role can be used to issue tokens. You must also configure the key with the
14
+ * role's Client ID to allow the role to use the key.
15
+ *
16
+ * ```typescript
17
+ * import * as pulumi from "@pulumi/pulumi";
18
+ * import * as vault from "@pulumi/vault";
19
+ *
20
+ * const config = new pulumi.Config();
21
+ * const key = config.get("key") || "key";
22
+ * const role = new vault.identity.OidcRole("role", {key: key});
23
+ * const keyOidcKey = new vault.identity.OidcKey("keyOidcKey", {
24
+ * algorithm: "RS256",
25
+ * allowedClientIds: [role.clientId],
26
+ * });
27
+ * ```
28
+ *
29
+ * If you want to create the key first before creating the role, you can use a separate
30
+ * resource to configure the allowed Client ID on
31
+ * the key.
32
+ *
33
+ * ```typescript
34
+ * import * as pulumi from "@pulumi/pulumi";
35
+ * import * as vault from "@pulumi/vault";
36
+ *
37
+ * const key = new vault.identity.OidcKey("key", {algorithm: "RS256"});
38
+ * const roleOidcRole = new vault.identity.OidcRole("roleOidcRole", {key: key.name});
39
+ * const roleOidcKeyAllowedClientID = new vault.identity.OidcKeyAllowedClientID("roleOidcKeyAllowedClientID", {
40
+ * keyName: key.name,
41
+ * allowedClientId: roleOidcRole.clientId,
42
+ * });
43
+ * ```
44
+ *
9
45
  * ## Import
10
46
  *
11
47
  * The key can be imported with the role name, for example
@@ -1 +1 @@
1
- {"version":3,"file":"oidcRole.js","sourceRoot":"","sources":["../../identity/oidcRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,QAAS,SAAQ,MAAM,CAAC,cAAc;IA8D/C,YAAY,IAAY,EAAE,WAA0C,EAAE,IAAmC;QACrG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwC,CAAC;YACvD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;aAAM;YACH,MAAM,IAAI,GAAG,WAAuC,CAAC;YACrD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,GAAG,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChD,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;aACtD;YACD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACvD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,QAAQ,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7D,CAAC;IApFD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqB,EAAE,IAAmC;QACnH,OAAO,IAAI,QAAQ,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC/D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,QAAQ,CAAC,YAAY,CAAC;IACzD,CAAC;;AA1BL,4BAsFC;AAxEG,gBAAgB;AACO,qBAAY,GAAG,kCAAkC,CAAC"}
1
+ {"version":3,"file":"oidcRole.js","sourceRoot":"","sources":["../../identity/oidcRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4CG;AACH,MAAa,QAAS,SAAQ,MAAM,CAAC,cAAc;IA8D/C,YAAY,IAAY,EAAE,WAA0C,EAAE,IAAmC;QACrG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwC,CAAC;YACvD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;aAAM;YACH,MAAM,IAAI,GAAG,WAAuC,CAAC;YACrD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,GAAG,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChD,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;aACtD;YACD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACvD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,QAAQ,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7D,CAAC;IApFD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqB,EAAE,IAAmC;QACnH,OAAO,IAAI,QAAQ,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC/D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,QAAQ,CAAC,YAAY,CAAC;IACzD,CAAC;;AA1BL,4BAsFC;AAxEG,gBAAgB;AACO,qBAAY,GAAG,kCAAkC,CAAC"}
@@ -1,5 +1,23 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
+ * ## Example Usage
4
+ *
5
+ * ```typescript
6
+ * import * as pulumi from "@pulumi/pulumi";
7
+ * import * as vault from "@pulumi/vault";
8
+ *
9
+ * const config = new vault.NomadSecretBackend("config", {
10
+ * address: "https://127.0.0.1:4646",
11
+ * backend: "nomad",
12
+ * defaultLeaseTtlSeconds: 3600,
13
+ * description: "test description",
14
+ * maxLeaseTtlSeconds: 7200,
15
+ * maxTtl: 240,
16
+ * token: "ae20ceaa-...",
17
+ * ttl: 120,
18
+ * });
19
+ * ```
20
+ *
3
21
  * ## Import
4
22
  *
5
23
  * Nomad secret backend can be imported using the `backend`, e.g.
@@ -6,6 +6,24 @@ exports.NomadSecretBackend = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
+ * ## Example Usage
10
+ *
11
+ * ```typescript
12
+ * import * as pulumi from "@pulumi/pulumi";
13
+ * import * as vault from "@pulumi/vault";
14
+ *
15
+ * const config = new vault.NomadSecretBackend("config", {
16
+ * address: "https://127.0.0.1:4646",
17
+ * backend: "nomad",
18
+ * defaultLeaseTtlSeconds: 3600,
19
+ * description: "test description",
20
+ * maxLeaseTtlSeconds: 7200,
21
+ * maxTtl: 240,
22
+ * token: "ae20ceaa-...",
23
+ * ttl: 120,
24
+ * });
25
+ * ```
26
+ *
9
27
  * ## Import
10
28
  *
11
29
  * Nomad secret backend can be imported using the `backend`, e.g.
@@ -1 +1 @@
1
- {"version":3,"file":"nomadSecretBackend.js","sourceRoot":"","sources":["../nomadSecretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;GAQG;AACH,MAAa,kBAAmB,SAAQ,MAAM,CAAC,cAAc;IA+FzD,YAAY,IAAY,EAAE,WAA8D,EAAE,IAAmC;QACzH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAkD,CAAC;YACjE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;aAAM;YACH,MAAM,IAAI,GAAG,WAAiD,CAAC;YAC/D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACvD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,kBAAkB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACvE,CAAC;IAlID;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA+B,EAAE,IAAmC;QAC7H,OAAO,IAAI,kBAAkB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACzE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,kBAAkB,CAAC,YAAY,CAAC;IACnE,CAAC;;AA1BL,gDAoIC;AAtHG,gBAAgB;AACO,+BAAY,GAAG,mDAAmD,CAAC"}
1
+ {"version":3,"file":"nomadSecretBackend.js","sourceRoot":"","sources":["../nomadSecretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;GA0BG;AACH,MAAa,kBAAmB,SAAQ,MAAM,CAAC,cAAc;IA+FzD,YAAY,IAAY,EAAE,WAA8D,EAAE,IAAmC;QACzH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAkD,CAAC;YACjE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;aAAM;YACH,MAAM,IAAI,GAAG,WAAiD,CAAC;YAC/D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACvD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,kBAAkB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACvE,CAAC;IAlID;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA+B,EAAE,IAAmC;QAC7H,OAAO,IAAI,kBAAkB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACzE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,kBAAkB,CAAC,YAAY,CAAC;IACnE,CAAC;;AA1BL,gDAoIC;AAtHG,gBAAgB;AACO,+BAAY,GAAG,mDAAmD,CAAC"}
@@ -1,5 +1,27 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
+ * ## Example Usage
4
+ *
5
+ * ```typescript
6
+ * import * as pulumi from "@pulumi/pulumi";
7
+ * import * as vault from "@pulumi/vault";
8
+ *
9
+ * const config = new vault.NomadSecretBackend("config", {
10
+ * backend: "nomad",
11
+ * description: "test description",
12
+ * defaultLeaseTtlSeconds: "3600",
13
+ * maxLeaseTtlSeconds: "7200",
14
+ * address: "https://127.0.0.1:4646",
15
+ * token: "ae20ceaa-...",
16
+ * });
17
+ * const test = new vault.NomadSecretRole("test", {
18
+ * backend: config.backend,
19
+ * role: "test",
20
+ * type: "client",
21
+ * policies: ["readonly"],
22
+ * });
23
+ * ```
24
+ *
3
25
  * ## Import
4
26
  *
5
27
  * Nomad secret role can be imported using the `backend`, e.g.
@@ -6,6 +6,28 @@ exports.NomadSecretRole = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
+ * ## Example Usage
10
+ *
11
+ * ```typescript
12
+ * import * as pulumi from "@pulumi/pulumi";
13
+ * import * as vault from "@pulumi/vault";
14
+ *
15
+ * const config = new vault.NomadSecretBackend("config", {
16
+ * backend: "nomad",
17
+ * description: "test description",
18
+ * defaultLeaseTtlSeconds: "3600",
19
+ * maxLeaseTtlSeconds: "7200",
20
+ * address: "https://127.0.0.1:4646",
21
+ * token: "ae20ceaa-...",
22
+ * });
23
+ * const test = new vault.NomadSecretRole("test", {
24
+ * backend: config.backend,
25
+ * role: "test",
26
+ * type: "client",
27
+ * policies: ["readonly"],
28
+ * });
29
+ * ```
30
+ *
9
31
  * ## Import
10
32
  *
11
33
  * Nomad secret role can be imported using the `backend`, e.g.
@@ -1 +1 @@
1
- {"version":3,"file":"nomadSecretRole.js","sourceRoot":"","sources":["../nomadSecretRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;GAQG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IA8DtD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;IAvFD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;;AA1BL,0CAyFC;AA3EG,gBAAgB;AACO,4BAAY,GAAG,6CAA6C,CAAC"}
1
+ {"version":3,"file":"nomadSecretRole.js","sourceRoot":"","sources":["../nomadSecretRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IA8DtD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;IAvFD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;;AA1BL,0CAyFC;AA3EG,gBAAgB;AACO,4BAAY,GAAG,6CAA6C,CAAC"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pulumi/vault",
3
- "version": "v5.4.0",
3
+ "version": "v5.4.1",
4
4
  "description": "A Pulumi package for creating and managing vault cloud resources.",
5
5
  "keywords": [
6
6
  "pulumi",
@@ -11,7 +11,7 @@
11
11
  "license": "Apache-2.0",
12
12
  "scripts": {
13
13
  "build": "tsc",
14
- "install": "node scripts/install-pulumi-plugin.js resource vault v5.4.0"
14
+ "install": "node scripts/install-pulumi-plugin.js resource vault v5.4.1"
15
15
  },
16
16
  "dependencies": {
17
17
  "@pulumi/pulumi": "^3.0.0"
package/package.json.dev CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pulumi/vault",
3
- "version": "v5.4.0",
3
+ "version": "v5.4.1",
4
4
  "description": "A Pulumi package for creating and managing vault cloud resources.",
5
5
  "keywords": [
6
6
  "pulumi",
@@ -11,7 +11,7 @@
11
11
  "license": "Apache-2.0",
12
12
  "scripts": {
13
13
  "build": "tsc",
14
- "install": "node scripts/install-pulumi-plugin.js resource vault v5.4.0"
14
+ "install": "node scripts/install-pulumi-plugin.js resource vault v5.4.1"
15
15
  },
16
16
  "dependencies": {
17
17
  "@pulumi/pulumi": "^3.0.0"
@@ -1,4 +1,19 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
+ /**
3
+ * ## Example Usage
4
+ *
5
+ * ```typescript
6
+ * import * as pulumi from "@pulumi/pulumi";
7
+ * import * as vault from "@pulumi/vault";
8
+ *
9
+ * const app = new vault.pkisecret.SecretBackendCert("app", {
10
+ * backend: vault_mount.intermediate.path,
11
+ * commonName: "app.my.domain",
12
+ * }, {
13
+ * dependsOn: [vault_pki_secret_backend_role.admin],
14
+ * });
15
+ * ```
16
+ */
2
17
  export declare class SecretBackendCert extends pulumi.CustomResource {
3
18
  /**
4
19
  * Get an existing SecretBackendCert resource's state with the given name, ID, and optional extra
@@ -5,6 +5,21 @@ Object.defineProperty(exports, "__esModule", { value: true });
5
5
  exports.SecretBackendCert = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("../utilities");
8
+ /**
9
+ * ## Example Usage
10
+ *
11
+ * ```typescript
12
+ * import * as pulumi from "@pulumi/pulumi";
13
+ * import * as vault from "@pulumi/vault";
14
+ *
15
+ * const app = new vault.pkisecret.SecretBackendCert("app", {
16
+ * backend: vault_mount.intermediate.path,
17
+ * commonName: "app.my.domain",
18
+ * }, {
19
+ * dependsOn: [vault_pki_secret_backend_role.admin],
20
+ * });
21
+ * ```
22
+ */
8
23
  class SecretBackendCert extends pulumi.CustomResource {
9
24
  constructor(name, argsOrState, opts) {
10
25
  let resourceInputs = {};